NEWS
How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business...

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More
NEWS
Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More
NEWS
Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and...

Read More
NEWS
What to look for in a Next-Gen PAM solution

By Alan Radford, PAM Field Strategist, One Identity.

Read More
NEWS
Five factors that form how Security Awareness training programs are developing

By Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.

Read More
NEWS
What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered...

Read More
NEWS
The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers...

Read More
NEWS
Zero Trust Network Access (ZTNA) vs VPNs: The new era of securing your workforce during crisis

By Salvatore Sinno, Chief Security Architect and Director of Cybersecurity Innovation, Unisys.

Read More
NEWS
Trend EDR: Protecting endpoints proactively

How IT managers protect corporate networks from targeted attacks By Chris Connell, Deputy Vice...

Read More

Videos

Jamie Akhtar, Co-Founder and CEO at CyberSmart, discusses the importance of cybersecurity solutions developed specifically for the SME market and the benefits they can bring to both the Channel and end users...
Sam Bainborough, Director, Strategic Segment Colocation & Hyperscale at Vertiv, discusses recent developments at the company, including expansion plans, liquid cooling, modular timber construction and energy...
Subhagata (Subho) Mukherjee, Vice President, Global Head of Sustainability, Nokia, shares some key highlights from the company’s People and Planet 2023 report, covering a year of achievements and challenges...
Venessa Moffat, EMEA Channel Manager, Ekkosense and Nick Ewing, MD of Efficiency IT, discuss the new partnership between the two companies which brings together EIT’s expertise in data centre design, build,...

News

Zero-trust networks deployable, at scale, in as little as 6 minutes, addresses current industry void for simplified networking and security in dynamic environments.
New VP of Product Innovation, Ed Granger, comes as leading enterprise transformation platform provider prepares more AI-led enhancements following period of exponential growth.
Bitdefender has launched Bitdefender Voyager Ventures (BVV), a new investment initiative dedicated to financing and nurturing the next generation of startups in cybersecurity, data analytics, automation, and...
In an ORX survey of 26 of the world’s biggest banks and insurers, three quarters (75%) of firms said that they have started using external GenAI tools in operations, with the most popular being Microsoft...